Khulna University of Engineering & Technology
Central Library

Normal view MARC view ISBD view

Web hacking : attacks and defense / Stuart McClure, Saumil Shah, Shreeraj Shah.

By: McClure, Stuart.
Contributor(s): Shah, Saumil | Shah, Shreeraj.
Material type: materialTypeLabelBookPublisher: Boston : Addison-Wesley, c2003Description: xxxi, 492 p. : ill. ; 24 cm.ISBN: 0201761769 (pbk.); 9788177582314.Subject(s): Computer networks -- Security measures | Web sites -- Security measures | Computer securityDDC classification: 005.8
Contents:
The E-Commerce Playground -- Web Languages: The Babylon of the 21st Century -- Web and Database Servers -- Shopping Carts and Payment Gateways -- HTTP and HTTPS: The Hacking Protocols -- URL: The Web Hacker's Sword -- URLs Unraveled -- Web: Under (the) Cover -- Reading Between the Lines -- Site Linkage Analysis -- How Do They Do It? -- Cyber Graffiti -- E-Shoplifting -- Database Access -- Java: Remote Command Execution -- Impersonation -- Buffer Overflowers: On-the-Fly -- Advanced Web Kung Fu -- Web Hacking: Automated Tools -- Worms -- Beating the IDS. Web and Database Port Listing -- HTTP/1.1 and HTTP/1.0 Method and Field Definitions -- Remote Command Execution Cheat Sheet -- Source Code, File, and Directory Disclosure Cheat Sheet -- Resources and Links -- Web-Related Tools.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number Copy number Status Date due Barcode Item holds
Books Books Central Library, KUET
General Stacks
005.8 MCC (Browse shelf) 1 Available 3010046905
Total holds: 0

Includes bibliographical references and index.

Pt. 1. The E-Commerce Playground -- Ch. 1. Web Languages: The Babylon of the 21st Century -- Ch. 2. Web and Database Servers -- Ch. 3. Shopping Carts and Payment Gateways -- Ch. 4. HTTP and HTTPS: The Hacking Protocols -- Ch. 5. URL: The Web Hacker's Sword -- Pt. 2. URLs Unraveled -- Ch. 6. Web: Under (the) Cover -- Ch. 7. Reading Between the Lines -- Ch. 8. Site Linkage Analysis -- Pt. 3. How Do They Do It? -- Ch. 9. Cyber Graffiti -- Ch. 10. E-Shoplifting -- Ch. 11. Database Access -- Ch. 12. Java: Remote Command Execution -- Ch. 13. Impersonation -- Ch. 14. Buffer Overflowers: On-the-Fly -- Pt. 4. Advanced Web Kung Fu -- Ch. 15. Web Hacking: Automated Tools -- Ch. 16. Worms -- Ch. 17. Beating the IDS. App. A. Web and Database Port Listing -- App. B. HTTP/1.1 and HTTP/1.0 Method and Field Definitions -- App. C. Remote Command Execution Cheat Sheet -- App. D. Source Code, File, and Directory Disclosure Cheat Sheet -- App. E. Resources and Links -- App. F. Web-Related Tools.

There are no comments for this item.

Log in to your account to post a comment.


Khulna University of Engineering & Technology
Funded by: HEQEP, UGC, Bangladesh